Ciphers

Results: 800



#Item
141ICE / MDS matrix / Advanced Encryption Standard / Feistel cipher / Matrix / Key schedule / Linear map / Cryptography / Block ciphers / Hierocrypt

Specification on a Block Cipher : Hierocrypt—3 Toshiba Corporation May 2002 Contents 1 Design principle

Add to Reading List

Source URL: www.cryptrec.go.jp

Language: English - Date: 2012-06-28 04:48:44
142Block cipher modes of operation / RSA / PKCS / Ciphertext / Basic Encoding Rules / Block cipher / Authenticated encryption / Stream ciphers / Ciphertext stealing / Cryptography / Public-key cryptography / Padding

Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format Vlastimil Klíma 1 and Tomáš Rosa 1,2 {vlastimil.klima, tomas.rosa}@i.cz 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-05-12 08:40:12
143RC4 / Keystream / ICE / Related-key attack / Cryptography / Stream ciphers / Py

Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy ? Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {wu.hongjun,bart.pre

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-02-22 22:33:26
144HC-256 / Q / Stream ciphers / Advanced Encryption Standard / Py

Comparison of 256-bit stream ciphers at the beginning of 2006 Daniel J. Bernstein ?

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2006-02-13 07:41:31
145Linear feedback shift register / Self-shrinking generator / Py / ESTREAM / QUAD / Keystream / Grain / Stream ciphers / Cryptography / Correlation attack

DECIMv2 ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-03-29 16:22:24
146Stream ciphers / Group theory / Latin squares / Quasigroup / Abstract algebra / Algebraic structure / Edon80 / ESTREAM / Keystream / Nonassociative algebra / Mathematics / Algebra

A Note on Algebraic Properties of Quasigroups in Edon80 Milan Vojvoda, Marek Sýs and Matú² Jókay , ,

Add to Reading List

Source URL: www.ecrypt.eu.org

Language: English - Date: 2007-02-07 09:06:33
147Block cipher / Symmetric-key algorithm / Playfair cipher / Ciphertext / Cipher / One-time pad / Keystream / Cryptanalysis / Cryptographic hash function / Cryptography / Stream ciphers / Substitution cipher

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 Cryptography

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-02-27 09:35:26
148Password / Login / Background check / Security / Cryptography / Stream ciphers / Feedback with Carry Shift Registers

PO Box 570 Jefferson City, MOToll-FreeFax: (Welcome to the

Add to Reading List

Source URL: www.health.mo.gov

Language: English - Date: 2015-04-17 17:10:56
149Password / Login / Background check / Security / Cryptography / Stream ciphers / Feedback with Carry Shift Registers

PO Box 570 Jefferson City, MOToll-FreeFax: (Welcome to the

Add to Reading List

Source URL: health.mo.gov

Language: English - Date: 2015-04-17 17:10:56
150Technology / Radio-frequency identification / Ubiquitous computing / Stream ciphers / Computer memory / Wireless identification and sensing platform / Impinj / Computer data storage / Card reader / Automatic identification and data capture / Computing / Cryptography

CCCP: Secure Remote Storage for Computational RFIDs∗ Mastooreh Salajegheh1 Shane Clark1 Benjamin Ransford1 Kevin Fu1 Ari Juels2 1 Department of Computer Science, University of Massachusetts Amherst 2 RSA Laboratories,

Add to Reading List

Source URL: spqr.eecs.umich.edu

Language: English - Date: 2012-12-06 13:30:53
UPDATE